SLIP Reports

Focus: Network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 08 Feb 2021 | Published: 24 Apr 2017

TechTarget ComputerWeekly.com

IP telephony trends: Migrating from PSTN to SIP trunking
sponsored by TechTarget Security
EGUIDE: Uncover the top five trends in enterprise IP telephony and learn the benefits and challenges of replacing PSTN with SIP-based services.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

TechTarget Security

Business Continuity Management Systems
sponsored by TechTarget ComputerWeekly.com
BOOK: Brush-up you knowledge of the practical aspects of business continuity management with this book extract.
Posted: 17 Dec 2012 | Published: 13 Dec 2012

TechTarget ComputerWeekly.com

Adaptive Packet Filtering
sponsored by Gigamon
WHITE PAPER: This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Gigamon

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

DNSSEC - Secure DNS For Government
sponsored by BlueCat
WHITE PAPER: This document examines the standards and guidelines as outlined by NIST, and demonstrates the ways in which BlueCat Network’s DNS solution address these guidelines.
Posted: 01 Sep 2010 | Published: 31 Aug 2010

BlueCat

Cisco IOS Digit Manipulation
sponsored by Global Knowledge
WHITE PAPER: Platform digit manipulation may be needed for many business phone calls as they traverse their gateways. his guide explores the role of digit manipulation techniques and various is ways it can benefit for your business.
Posted: 21 Jan 2014 | Published: 31 Dec 2013

Global Knowledge

Disaster Preparedness for Core Network Services
sponsored by Infoblox
WHITE PAPER: This white paper will take a look at how failures can unexpectedly disrupt core network services and the applications that depend on them despite employing traditional approaches to providing redundant configurations. Read this white paper to learn how to minimize the effects of failures to ensure business continuity.
Posted: 15 Aug 2013 | Published: 31 Jan 2013

Infoblox

The Swiss Army Knife for the Network Analyst
sponsored by Riverbed Technology, Inc.
CASE STUDY: This exclusive case study covers a tool that helped one company with their network and protocol analysis.
Posted: 31 Jul 2014 | Published: 03 Aug 2013

Riverbed Technology, Inc.

The Four Elements of IS-IS
sponsored by Global Knowledge
WHITE PAPER: This informative guide discusses 4 key elements for the implementation of Intermediate System - Intermediate System (IS-IS).
Posted: 02 Apr 2014 | Published: 02 Apr 2014

Global Knowledge